MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet

نویسندگان

  • Sanjay Vishwakarma
  • Ananthanarayanan Chockalingam
چکیده

In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finitealphabet input in the presence of an user and J non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code consists of two parts: i) common message (non-secret), and ii) secret message. The source transmits two independent messages: i) common message (non-secret), and ii) secret message. The common message is transmitted at a fixed rate R0, and it is intended for the user. The secret message is also intended for the user but it should be kept secret from the J eavesdroppers. The source and the MIMO DF relay operate under individual power constraints. In order to improve the secrecy rate, the MIMO relay also injects artificial noise. The CSI on all the links are assumed to be imperfect and CSI errors are assumed to be norm bounded. In order to maximize the worst case secrecy rate, we maximize the worst case link information rate to the user subject to: i) the individual power constraints on the source and the MIMO relay, and ii) the best case link information rates to J eavesdroppers be less than or equal to R0 in order to support a fixed common message rate R0. Numerical results showing the effect of perfect/imperfect CSI, presence/absence of AN with finite-alphabet input on the secrecy rate are presented. keywords: MIMO relay beamforming, physical layer security, multiple eavesdroppers, artificial noise, imperfect CSI, finite-alphabet input, semidefinite programming.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust MIMO Harvest-and-Jam Helpers and Relaying for Secret Communications

Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...

متن کامل

Sum-Rate Maximization Based on Power Constraints for Cooperative AF Relay Networks

In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...

متن کامل

Decode-and-Forward Relay Beamforming with Secret and Non-Secret Messages

In this paper, we study beamforming in decode-andforward (DF) relaying using multiple relays, where the source node sends a secret message as well as a non-secret message to the destination node in the presence of multiple non-colluding eavesdroppers. The non-secret message is transmitted at a fixed rate R0 and requires no protection from the eavesdroppers, whereas the secret message needs to b...

متن کامل

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey

Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration. This paper provides a survey of recent research and developm...

متن کامل

Guaranteeing Positive Secrecy Capacity with Finite-Rate Feedback using Artificial Noise

While the impact of finite-rate feedback on the capacity of fading channels has been extensively studied in the literature, not much attention has been paid to this problem under secrecy constraint. In this work, we study the ergodic secret capacity of a multiple-input multiple-output multiple-antennaeavesdropper (MIMOME) wiretap channel with quantized channel state information (CSI) at the tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1505.00573  شماره 

صفحات  -

تاریخ انتشار 2015